• No products in the cart.

Course Overview

The use of corporate computers and devices in a secure way helps ensure that you don’t jeopardize your work, organization or personal security. Explore security concepts related to information management, data protection and destruction mechanisms, incident management procedures, remote access procedures, physical controls, common threats and defensive mechanisms to protect corporate assets from malicious attacks. The following are the highlights of the course:

  • distinguish between confidentiality, integrity, and availability security objectives
  • describe general IT policy characteristics
  • identify computer and hardware security policy best practices
  • describe characteristics and best practices for using file encryption and access controls to protect your corporate computer
  • describe characteristics and best practices for using system patches to protect your corporate computer
  • describe characteristics and best practices for using antivirus software to protect your corporate computer
  • define incident response and the incident response process
  • define disaster recovery and the disaster recovery plan
  • describe media sanitization and data destruction
  • describe the benefits of labeling and handling
  • describe the purpose of data retention

Course Reviews

4.7

4.7
3913 ratings
  • 5 stars2
  • 4 stars1
  • 3 stars0
  • 2 stars0
  • 1 stars0
  1. Helpful

    4

    Its a good course and covers all the fundamentals.

  2. good concepts

    5

    Good overview of security concepts